Get Free Shipping on orders over $79
Understanding Session Border Controllers : Comprehensive Guide to Deploying and Maintaining Cisco Unified Border Element Solutions - Chidambaram Arunachalam

Understanding Session Border Controllers

Comprehensive Guide to Deploying and Maintaining Cisco Unified Border Element Solutions

By: Chidambaram Arunachalam, Steve Holl, Kyzer Davis, Kaustubh Inamdar, Gonzalo Salgueiro

Paperback | 17 January 2019 | Edition Number 1

At a Glance

Paperback


$155.75

or 4 interest-free payments of $38.94 with

 or 

Ships in 10 to 15 business days

The complete guide to deploying and operating SBC solutions, Including Cisco Unified Border Element (CUBE)

Enterprise and service provider networks are increasingly adopting SIP as the guiding protocol for session management, and require leveraging Session Border Controller (SBC) technology to enable this transition. Thousands of organizations have made the Cisco Unified Border Element (CUBE) their SBC technology of choice.

Understanding Session Border Controllers gives network professionals and consultants a comprehensive guide to SBC theory, design, deployment, operation, security, troubleshooting, and more. Using CUBE-based examples, the authors offer insights that will be valuable to technical professionals using any SBC solution.

The authors thoroughly cover native call control protocols, SBC behavior, and SBC's benefits for topology abstraction, demarcation and security, media, and protocol interworking. They also present practical techniques and configurations for achieving interoperability with a wide variety of collaboration products and solutions.

  • Evaluate key benefits of SBC solutions for security, management, and interoperability
  • Master core concepts of SIP, H.323, DTMF, signaling interoperability, call routing, fax/modem over IP, security, media handling, and media/signal forking in the SBC context
  • Compare SBC deployment scenarios, and optimize deployment for your environment
  • Size and scale an SBC platform for your environment, prevent oversubscription of finite resources, and control cost through careful licensing
  • Use SBCs as a back-to-back user agent (B2BUA) to interoperate between asymmetric VoIP networks
  • Establish SIP trunking for PSTN access via SBCs
  • Interoperate with call servers, proxies, fax servers, ITSPs, redirect servers, call recording servers, contact centers, and other devices
  • Secure real-time communications over IP
  • Mitigate security threats associated with complex SIP deployments
  • Efficiently monitor and manage an SBC environment

More in Networking Standards & Protocols

TCP/IP Illustrated : The Protocols, Volume 1 - Kevin Fall

RRP $112.30

$85.99

23%
OFF
TCP/IP Network Administration 3e : O'Reilly Ser. - Craig Hunt

RRP $104.75

$51.75

51%
OFF
DNS and BIND 5e : OREILLY - Cricket Liu

RRP $114.00

$55.75

51%
OFF
Using SANs & NAS : O'Reilly Ser. - W Curtis Preston

RRP $56.99

$30.75

46%
OFF
Linux Network Administrator's Guide : O'Reilly Ser. - Tony Bautts
Top-Down Network Design : 3rd edition - Priscilla Oppenheimer

RRP $123.85

$81.75

34%
OFF
Automating Junos Administration - Jonathan Looney

RRP $95.00

$47.75

50%
OFF
Network Security Assessment : Know Your Network : 3rd Edition - Chris Mcnab
Zero Trust Networks : Building Secure Systems in Untrusted Network - Christina Morillo
HTTP Pocket Reference : Pocket Reference (O'Reilly) - Clinton Wong

RRP $18.99

$9.00

53%
OFF
HTTP : Understanding Web Internals - David Gourley

RRP $123.75

$60.75

51%
OFF